Analyze industry trends and outline potential impact to the enterprise edit

Perform on-going research edit

Best practices edit

New technologies edit

New security systems and services edit

Technology evolution (e.g. RFCs, ISO) edit

Situational awareness edit

Latest client-side attacks edit

Threats edit

Counter zero day edit

Emergent issues edit

Research security implications of new business tools edit

Social media/networking edit

Integration within the business (e.g. advising on the placement of company material for the general public) edit

Global IA industry/community edit

Conventions edit

Attackers edit

Emerging threat sources edit

Research security requirements for contracts edit

Request for Proposal (RFP) edit

Request for Quote (RFQ) edit

Request for Information (RFI) edit

Agreements edit

Carry out relevant analysis for the purpose of securing the enterprise edit

Benchmark edit

Prototype and test multiple solutions edit

Cost benefit analysis (Return on Investment - ROI, Total Cost of Ownership - TCO) edit

Analyze and interpret trend data to anticipate cyber defense aids edit

Review effectiveness of existing security edit

Reverse engineer / deconstruct existing solutions edit

Analyze security solutions to ensure they meet business needs edit

Specify the performance edit

Latency edit

Scalability edit

Capability edit

Usability edit

Maintainability edit

Availability (MTTR- Mean Time To Recovery, MTBF- Mean-Time Between Failure) edit

Conduct a lessons-learned / after-action review edit

Use judgment to solve difficult problems that do not have a best solution edit

Conduct network traffic analysis edit